Skip to main content
NetApp Knowledge Base

How does Active IQ Unified Manager detect ransomware on ONTAP and trigger event "Ransomware activities detected"?

Views:
22
Visibility:
Public
Votes:
0
Category:
active-iq-unified-manager
Specialty:
OM
Last Updated:

Applies to

  • Active IQ Unified Manager (AIQUM)
  • ONTAP 9

Answer

  • AIQUM event Ransomware activities detected is NOT based on cluster configuration data collected from ONTAP every 15 minutes
  • Ransomware activities detected is based on EMS event callhome.arw.activity.seen on the ONTAP side
  • When EMS event callhome.arw.activity.seen is generated, the event is notified to AIQUM due to the default event notification configuration on ONTAP

cluster1::*> event notification destination show -type rest-api
Name            Type        Destination
--------------  ----------  ---------------------
192-168-0-71_server
                rest-api    https://192.168.0.71:9443/acq/ontap/ems

  • After receiving the notification, AIQUM collects the details of the event from ONTAP via API, and generates AIQUM event Ransomware activities detected 

 

 

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.